high match confidence
Sentence-level differences:
- Reworded sentence: "We rely on our information systems and third-party information systems to provide access to our web-based products and services, keep financial records, analyze results of operations, process orders and shipments, manage inventory, store confidential or proprietary information, and operate other critical functions."
- Reworded sentence: "In addition, the use of AI and other emerging technologies by threat actors is growing, enabling more sophisticated and effective cybersecurity attacks and phishing and social engineering schemes and further increasing attack volume and frequency."
- Reworded sentence: "Furthermore, updates or other software changes can lead to software or system inoperability or inadvertently introduce security vulnerabilities, including vulnerabilities that had been previously remedied or from malicious code injected in a “supply chain” cyberattack."
- Reworded sentence: "We, and some of our third-party vendors, have experienced cybersecurity attacks by threat actors (which may include state-sponsored organizations or nation state actors) and other cybersecurity breaches and incidents in the past, including, among other things, computer viruses and malware, ransomware, denial of service actions, phishing schemes, social engineering, the compromise, misappropriation and/or unauthorized access to (or acquisition or disclosure of) confidential or 25 25 25 otherwise protected information, and similar events, and will likely experience further attacks, breaches and incidents in the future, potentially with more frequency."
- Reworded sentence: "We have adopted measures to mitigate potential risks associated with information technology disruptions and cybersecurity threats; however, given the unpredictability of the timing, nature, and scope of such disruptions and the evolving nature of cybersecurity threats, which vary in technique and sources, if we or our business partners or suppliers were to experience a system disruption, attack or security breach or incident that impacts any of our critical functions, or our customers were to experience a system disruption, attack or security breach or incident via any of our software or connected IoT products and services, we could be subject to production downtimes, operational and/or productivity delays, other detrimental impacts on our operations or ability to provide products and services to our customers, the compromise, misappropriation and/or unauthorized access to (or acquisition or disclosure of) confidential or otherwise protected information, destruction or corruption of data, security breaches, other manipulation or misuse of our systems or networks, financial losses and additional costs from remedial actions, repairs to infrastructure, physical systems or data processing systems, increased cybersecurity and information technology protection costs, loss of business or potential liability, and/or damage to our reputation, any of which could have a material adverse effect on our business strategy, competitive position, results of operations, cash flows, financial condition, or prospects."
Current (2026):
We rely on our information systems and third-party information systems to provide access to our web-based products and services, keep financial records, analyze results of operations, process orders and shipments, manage inventory, store confidential or proprietary information,…
Read full text
We rely on our information systems and third-party information systems to provide access to our web-based products and services, keep financial records, analyze results of operations, process orders and shipments, manage inventory, store confidential or proprietary information, and operate other critical functions. In addition, some of our products and services are cloud-based and connect to the “Internet of Things” (“IoT”), including information systems that collect and use data on behalf of customers (e.g., veterinary practice management systems and customer communication tools and services) and our connected IoT devices (e.g., IDEXX VetLab Stations and analyzers) that enable our integrated, comprehensive diagnostic solution for veterinary practices, and these products and services rely on third-party providers for cloud computing and storage. These information systems and networks are susceptible to damage, disruption, or shutdown from multiple factors, including failures during the process of upgrading or replacing software, databases, or components; power outages; telecommunications or system failures; terrorist attacks; natural disasters; individual error or malfeasance; server or cloud provider breaches; computer viruses or cyber security attacks or other breaches or incidents. Although we maintain security policies and measures and internal controls, employ system backup measures, engage in redundancy planning and processes, and invest in our data and information technology infrastructure, such policies, measures, controls, planning processes, and investments, as well as our current disaster recovery plans, have not always been effective, and there can be no assurance that these (or any future efforts) will be effective, in preventing any information system or network damage, disruption, or shutdown. The continued use of remote and hybrid work arrangements may additionally result in some increased risk associated with our employees accessing our data and systems remotely. In addition, the use of AI and other emerging technologies by threat actors is growing, enabling more sophisticated and effective cybersecurity attacks and phishing and social engineering schemes and further increasing attack volume and frequency. Our software and some of our other products and services incorporate or rely on information technology and systems that are highly technical and complex, and the timely development, testing, release and deployment of software updates are important for defending against security vulnerabilities. If we or our business partners and suppliers fail to timely develop, test and deploy software updates, the security of our and our customers’ networks and information systems may be at risk. Vulnerabilities may persist even after a software update is released if the update fails to address the vulnerability’s root cause or is otherwise insufficient, testing of the update delays its timely deployment, there is a failure to install the most recent updates, or customers persist in using solutions that are end of life and no longer receive updates. Furthermore, updates or other software changes can lead to software or system inoperability or inadvertently introduce security vulnerabilities, including vulnerabilities that had been previously remedied or from malicious code injected in a “supply chain” cyberattack. In addition, in some cases, we rely on third-party providers to develop, test and release software updates on a timely basis, and there can be no assurance that these third-party providers will timely or effectively remedy vulnerabilities. We, and some of our third-party vendors, have experienced cybersecurity attacks by threat actors (which may include state-sponsored organizations or nation state actors) and other cybersecurity breaches and incidents in the past, including, among other things, computer viruses and malware, ransomware, denial of service actions, phishing schemes, social engineering, the compromise, misappropriation and/or unauthorized access to (or acquisition or disclosure of) confidential or 25 25 25 otherwise protected information, and similar events, and will likely experience further attacks, breaches and incidents in the future, potentially with more frequency. To our knowledge, none have resulted in any material adverse impact to the Company, our business strategy, results of operations or financial condition. We have adopted measures to mitigate potential risks associated with information technology disruptions and cybersecurity threats; however, given the unpredictability of the timing, nature, and scope of such disruptions and the evolving nature of cybersecurity threats, which vary in technique and sources, if we or our business partners or suppliers were to experience a system disruption, attack or security breach or incident that impacts any of our critical functions, or our customers were to experience a system disruption, attack or security breach or incident via any of our software or connected IoT products and services, we could be subject to production downtimes, operational and/or productivity delays, other detrimental impacts on our operations or ability to provide products and services to our customers, the compromise, misappropriation and/or unauthorized access to (or acquisition or disclosure of) confidential or otherwise protected information, destruction or corruption of data, security breaches, other manipulation or misuse of our systems or networks, financial losses and additional costs from remedial actions, repairs to infrastructure, physical systems or data processing systems, increased cybersecurity and information technology protection costs, loss of business or potential liability, and/or damage to our reputation, any of which could have a material adverse effect on our business strategy, competitive position, results of operations, cash flows, financial condition, or prospects. We, our customers, and other users of our products and services also may not promptly learn of or have the ability to fully assess the magnitude or effects of a security vulnerability in connected IoT devices and networks, including the extent, if any, to which a vulnerability has been exploited. Additionally, we have acquired, and in the future may acquire, companies or assets that have less sophisticated information systems, cybersecurity practices, or training, which may result in an increased risk of cybersecurity attacks, breaches, or incidents. Our customers and/or employees could also face negative consequences such as the compromise of sensitive or critical information or systems. Furthermore, access to, public disclosure of, or other loss of data or information (including any of our confidential or proprietary information or personal data or information) as a result of an attack or security breach or incident has given, and in the future may give, rise to notification obligations to individuals, regulators, customers, employees, and others, and could result in governmental actions or private claims or proceedings, any of which could damage our reputation, cause a loss of confidence in our products and services, damage our ability to develop (and protect our rights to) our differentiated technologies, and have a material adverse effect on the Company, our business strategy, financial condition, results of operations, or prospects. While we maintain a cyber risk insurance policy, it may not cover any or all claims, costs or losses associated with all cybersecurity events. For more information regarding personal data and information privacy and data protection risks, refer to “Our operations and reputation may be impaired if we, our products, or our services do not comply with our global privacy policy or evolving laws, regulations, and industry standards regarding data privacy and protection” below.
View prior text (2025)
We rely on our information systems, as well as third-party information systems, to provide access to our web-based products and services, keep financial records, analyze results of operations, process orders and shipments, manage inventory, store confidential or proprietary information, and operate other critical functions. In addition, some of our products and services include information systems that collect and use data on behalf of customers (e.g., veterinary practice management systems and customer communication tools and services), and some products and services rely on third-party providers for cloud computing and storage. Although we maintain security policies and measures, employ system backup measures, and engage in redundancy planning and processes, such policies, measures, planning and processes, as well as our current disaster recovery plans, may be ineffective or inadequate to address all eventualities. Further, our information systems and our business partners’ and suppliers’ information systems have experienced, and will likely continue to experience, attacks by hackers and other threat actors and other cybersecurity breaches and incidents, including, among other things, computer viruses and malware, ransomware, denial of service actions, phishing schemes, the compromise, misappropriation and/or unauthorized acquisition or disclosure of confidential or otherwise protected information and similar events through the internet (including via devices and applications connected to the internet), and through email attachments and persons with access to these information systems, such as our employees or third parties with whom we do business. The continued use of remote and hybrid work arrangements may additionally result in some increased risk associated with our employees accessing our data and systems remotely. In addition, security industry experts and government officials have warned about the risks of threat actors, such as hackers, nation state actors, and organized groups, targeting U.S. organizations, and recent developments in the cyber threat landscape include the growing use of AI, which could enable or create more sophisticated cybersecurity attacks and increase attack volume and frequency. As information systems and the use of software and related applications by us, our business partners, suppliers, and customers become more cloud-based and connected to the “Internet of Things” (“IoT”), there has been an increase in global cybersecurity vulnerabilities and threats, including more sophisticated and targeted cyber-related attacks that pose a risk to the security of our information systems and networks and the security, confidentiality, availability and integrity of data and information. We process credit card payments electronically over secure networks and offer IoT products and services, such as our connected devices (e.g., IDEXX VetLab instruments). Any such attack or breach could compromise our networks and the information stored thereon could be accessed, publicly disclosed, lost, or stolen. While we have implemented network security and internal control measures, especially for the purpose of protecting our connected products and services from cyberattacks, and invested in our data and information technology infrastructure, these efforts have not always been successful in preventing, and there can be no assurance that these efforts (or any future investments or efforts) will prevent, a system disruption, attack, or security breach. Our software and some of our other products and services incorporate or rely on information technology and systems that are highly technical and complex, and the timely development, testing, release and deployment of software updates are important for defending against security vulnerabilities. If we or our business partners and suppliers fail to timely develop, test and deploy software updates, the security of our and our customers’ networks and information systems may be at risk. Vulnerabilities may persist even after a software update is released if the update fails to address the vulnerability’s root cause or is otherwise insufficient, testing of the update delays its timely deployment, there is a failure to install the most recent updates, or customers persist in using solutions that are end of life and no longer receive updates. Furthermore, updates or other software changes can lead to software or system inoperability or inadvertently introduce security vulnerabilities, including vulnerabilities 25 25 25 that had been previously remedied or from malicious code injected in a “supply chain” cyberattack. In addition, in some cases, we rely on third-party providers to develop, test and release software updates on a timely basis, and there can be no assurance that these third-party providers will timely or effectively remedy vulnerabilities. We, and some of our third-party vendors, have experienced cybersecurity attacks and incidents in the past and will likely experience further attacks and incidents in the future, potentially with more frequency. To our knowledge, none have resulted in any material adverse impact to the Company, our business strategy, results of operations or financial condition. We have adopted measures to mitigate potential risks associated with information technology disruptions and cybersecurity threats; however, given the unpredictability of the timing, nature and scope of such disruptions and the evolving nature of cybersecurity threats, which vary in technique and sources, if we or our business partners or suppliers were to experience a system disruption, attack or security breach or incident that impacts any of our critical functions, or our customers were to experience a system disruption, attack or security breach or incident via any of our software or connected products and services, we could potentially be subject to production downtimes, operational and/or productivity delays, other detrimental impacts on our operations or ability to provide products and services to our customers, the compromise, misappropriation and/or unauthorized acquisition or disclosure of confidential or otherwise protected information, destruction or corruption of data, security breaches, other manipulation or misuse of our systems or networks, financial losses and additional costs from remedial actions, repairs to infrastructure, physical systems or data processing systems, increased cybersecurity and information technology protection costs, loss of business or potential liability, and/or damage to our reputation, any of which could have a material adverse effect on our business strategy, competitive position, results of operations, cash flows, financial condition, or prospects. Additionally, the post-acquisition integration process of acquired companies that may have less sophisticated information systems, cybersecurity practices, or training, may result in an increased risk of cybersecurity incidents. Our customers and/or employees could also face negative consequences such as the compromise of sensitive or critical information or systems. Furthermore, access to, public disclosure of, or other loss of data or information (including any of our confidential or proprietary information or personal data or information) as a result of an attack or security breach or incident has given, and in the future may give, rise to notification obligations to individuals, regulators, customers, employees, and others, and could result in governmental actions or private claims or proceedings, any of which could damage our reputation, cause a loss of confidence in our products and services, damage our ability to develop (and protect our rights to) our differentiated technologies and have a material adverse effect on the Company, our business strategy, financial condition, results of operations or prospects. While we maintain a cyber risk insurance policy intended to address risk of loss due to certain types of cybersecurity events, it may not cover any or all claims, costs or losses associated with such events. For more information regarding personal data and information privacy and data protection risks, refer to “Our operations and reputation may be impaired if we, our products, or our services do not comply with our global privacy policy or evolving laws and regulations regarding data privacy and protection” below.